Sciweavers

COMPUTER
2004
120views more  COMPUTER 2004»
13 years 4 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
COMPSEC
2004
105views more  COMPSEC 2004»
13 years 4 months ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
COMCOM
2004
120views more  COMCOM 2004»
13 years 4 months ago
IPsec-based end-to-end VPN deployment over UMTS
Next generation mobile users require flexible security mechanisms, which provide customized security services to data traffic, take into account end-user mobility and mobile netwo...
Christos Xenakis, Lazaros F. Merakos
COMCOM
2004
137views more  COMCOM 2004»
13 years 4 months ago
Security performance of loaded IEEE 802.11b wireless networks
Existing solutions for wireless LAN networks have been subject to security vulnerabilities and previous study has addressed and evaluated the security performance of IEEE 802.11b ...
Nilufar Baghaei, Ray Hunt
JSW
2007
147views more  JSW 2007»
13 years 4 months ago
Towards Secure e-Learning Applications: a Multiagent Platform
—This paper presents some results in the intersection of three technological fields: e-learning, multiagent systems, and standards to improve the development of secure systems. T...
Carine G. Webber, Maria de Fátima Webber do...
TVLSI
2008
144views more  TVLSI 2008»
13 years 4 months ago
Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective
Abstract--Embedded systems present significant security challenges due to their limited resources and power constraints. This paper focuses on the issues of building secure embedde...
Guy Gogniat, Tilman Wolf, Wayne P. Burleson, Jean-...
JPDC
2007
86views more  JPDC 2007»
13 years 4 months ago
Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity
High quality of security is increasingly critical for applications running on heterogeneous distributed systems. However, existing scheduling algorithms for heterogeneous distribu...
Tao Xie 0004, Xiao Qin
TPDS
2008
106views more  TPDS 2008»
13 years 4 months ago
Security-Aware Resource Allocation for Real-Time Parallel Jobs on Homogeneous and Heterogeneous Clusters
Security is increasingly becoming an important issue in the design of real-time parallel applications, which are widely used in the industry and academic organizations. However, ex...
Tao Xie 0004, Xiao Qin
JIPS
2007
223views more  JIPS 2007»
13 years 4 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
JCP
2007
154views more  JCP 2007»
13 years 4 months ago
Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures
—The computational Grid concept is gaining great popularity as the best way to deliver access to a wide range of distributed computing and data resources. But, as Grids move from...
Francesco Palmieri